GRC300 - SAP BusinessObjects Access Control 5.

3 Implementation and Configuration
Course Version: 084

Duration: 5 days Audience
Key Technical Business User involved in an Access Control project IT Governance Experts Consultants for SAP Security and GRC IT Auditors

Prerequisites:
Essential GRC030 SAP GRC Access Control 5.3 – Overview Knowledge of integrated processes in an SAP System. Knowledge of authorization concept of an SAP System. Recommended None

Goals
Explain how SAP GRC Access Control (Risk Analysis and Remediation, Superuser Privilege Management, Compliant User Provisioning and Enterprise Role Management) works in combination with SAP business processes Show how to implement SAP GRC Access Control following the best practices from SAP Demonstrate the functionalities and usage of the different components within SAP GRC Access Control Discuss how to use the SoD Management process as standard approach for implementing SAP GRC Access Control in a sustainable manner Configure and use workflow-based SoD and User Access Reviews to ensure a continuous assessment of the risk situation by the business process owners Discuss how the use of Enterprise Role Management will help to maintain a clean SoD environment with respect to your organization’s roles Identify the integration points across the whole SAP GRC Access Control Suite

Course Based on Software Release
SAP GRC Access Control 5.3 SAP ERP Central Control 6.0

Content
Overview of SAP GRC Access Control SAP GRC Access Control Authorizations Risk Analysis and Remediation

o o o

Overview Verification of Installation Introduction to the SoD Risk Management Process

o o o o o o o o o o o o o o o o o o o Rule Building and Validation Risk Analysis Risk Remediation Mitigation Continuous Compliance Compliant User Provisioning Overview Verification of Installation Compliant User Provisioning Functionality Workflow-based Reviews Compliant User Management Lifecycle Superuser Privilege Management Overview Verification of Installation Superuser Privilege Management functionality and uses Enterprise Role Management Overview Verification of Installation Configuration Review Workflow Steps Access Control Integration Integration between all Access Control Products Compliance Reporting .

Sign up to vote on this title
UsefulNot useful